Korean
<< Back
VID 22514
Severity 30
Port 80, ...
Protocol TCP
Class WWW
Detailed Description According to its self-reported version number, the instance of Apache Tomcat 7.x listening on the remote host is earlier than 7.0.11 and as such, may be affected by a security bypass vulnerability.

When a web application is started, 'ServletSecurity' annotations might be ignored which could lead to some areas of the applications not being protected as expected.

Note that Nessus did not actually test for the flaw but instead has relied on the version in Tomcat's banner or error page.

* Note: This check solely relied on the version number of the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.11_(released_11_Mar_2011)
http://mail-archives.apache.org/mod_mbox/www-announce/201103.mbox/%3C4D6E74FF.7050106@apache.org%3E

* Platforms Affected:
Apache Tomcat Server versions prior to 7.0.11
Any operating system Any version
Recommendation Upgrade to the latest version of Apache Tomcat Server (7.0.11 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/
Related URL CVE-2011-1088 (CVE)
Related URL 46685 (SecurityFocus)
Related URL (ISS)